Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

52 results about "Authorization" patented technology

Authorization is the function of specifying access rights/privileges to resources, which is related to information security and computer security in general and to access control in particular. More formally, "to authorize" is to define an access policy. For example, human resources staff are normally authorized to access employee records and this policy is usually formalized as access control rules in a computer system. During operation, the system uses the access control rules to decide whether access requests from (authenticated) consumers shall be approved (granted) or disapproved (rejected). Resources include individual files or an item's data, computer programs, computer devices and functionality provided by computer applications. Examples of consumers are computer users, computer Software and other Hardware on the computer.

System and method for conducting secure commercial order transactions

InactiveUS20060106699A1FinancePayment architecturePaymentService provision
The inventive system and method enable secure remote commercial order transactions between customers and merchants. The inventive system and method ensure that customer entire confidential financial data (CFD) is never transmitted to the merchant by keeping that CFD proprietary to the customer's exiting financial service provider (FSP) with which the customer has established a financial account, and from which the merchant is authorized to receive payments. When an order is placed, the customer provides to the merchant a partial CFD (PCFD) sufficient, along with additional data, to identify the FSP to the merchant, and to identify the customer to the FSP. The merchant then provides the PCFD, along with at least partial order data, to the FSP, and order confirmation data (OCD) to the customer. Various embodiments of a novel order verification process are also provided that enable authorization, by the customer, of the order through contact between the customer and the FSP. In this manner, the complete CFD is kept absolutely secure as it never leaves the possession of the customer and the FSP. Optionally, the FSP is given the opportunity to offer additional services and / or products to the customer during order authentication, that are related or unrelated to the order. Advantageously, the inventive system and method function equally well for interactive electronic (e.g., online) orders, telephone orders, mobile commerce orders, facsimile orders, mail-order orders, and even in-person orders.
Owner:BYZ TEK

Heterogeneous and integrated hybrid cloud resource management platform

InactiveCN109347676ARealize managementRealize unified managementData switching networksResource poolFull life cycle
The invention discloses a heterogeneous and integrated hybrid cloud resource management platform, comprising a cloud management platform which is a window for a user to interact with an infrastructureas a service (IAAS) layer platform and is connected with an infrastructure as a service layer; and the infrastructure as a service layer which is used for docking with the IAAS layer platform, shielding difference among various different suppliers on the IAAS layer platform and providing a uniform resource adaptive abstract interface for the cloud management platform. The cloud management platform comprises a resource management module which is a cloud management platform body, is connected with the infrastructure as a service layer and provides uniform management of resource pools for a resource manager; and a uniform user management module which provides functions such as tenant management, department management, user management, user group management and role authority authorization management, and supports a single sign on function. According to the heterogeneous and integrated hybrid cloud resource management platform, full life cycle tracking management is carried out, a customer can manage heterogeneous and integrated hybrid cloud resources based on the platform, and business application cloudization migration, reliability and IT operation efficiency are clearly improved.
Owner:HANGZHOU YUNJI TECH CO LTD

Method and system for establishing distribution network model

The invention relates to the technical field of distribution network models, and provides a method and a system for establishing a distribution network model. The method comprises the following steps: acquiring preset maintenance authorizations of the distribution network model; establishing a primary equipment model and a secondary equipment model in a range specified by the maintenance authorizations, and drawing a figure, wherein the secondary equipment model and the figure are respectively associated with the primary equipment model; according to the primary equipment model, the secondary equipment model and the figure which are associated, generating a network topology model; and informing other model maintenance modules to update network topology models respectively maintained by themselves according to the generated network topology model by using online modeling information. According to the invention, through acquiring the preset maintenance authorizations of the distribution network model, the correctness of a multi-people maintenance model can be ensured, thereby facilitating maintenance; and other model maintenance modules are informed to update network topology models respectively maintained by themselves according to the generated network topology model by using online modeling information, so that a power grid model is always consistent with an actual power-grid running model.
Owner:云谷技术(珠海)有限公司

House-renting management system capable of opening locks based on Bluetooth or two-dimensional codes and method thereof

InactiveCN106530454ALow costProtection of rights and interestsData processing applicationsIndividual entry/exit registersStructure of Management InformationDimensional modeling
The invention discloses a house-renting management system capable of opening locks based on Bluetooth or two-dimensional codes and a method thereof and belongs to an intelligent house management system. The house-renting management system comprises a network server, an intelligent terminal and an intelligent lock body, wherein a database is arranged in the network server; the database at least comprises a lock body ID list, a user ID list and authorization relations between all lock body IDs and user IDs; the intelligent terminal is accessed to the network server via network; a lock cylinder main controller is arranged in the intelligent lock body and is accessed to a receiving device and a lock cylinder mechanical structure; landlords can remotely authorize the lock body IDs in the database of the network server through the intelligent terminal; tenants obtain dynamic unlocking keys through the intelligent terminal and can open the lock bodies through the dynamic unlocking keys. Through the house-renting management system capable of opening locks based on the Bluetooth or the two-dimensional codes and the method thereof, the operation is simple and convenient; the problem that the conventional keys are easily lost can be solved; meanwhile, the locks are opened by using the dynamic unlocking keys, so that the problem that the locks are changed when the tenants are changed can be solved; the house renting cost is effectively reduced; the conflicts between the landlords and the tenants can be reduced; and the rights of the landlords can be effectively guaranteed.
Owner:俞毅

Charging service intelligent implementation method and device on basis of terminal

InactiveCN106297030ASolve the problem that the charging service point cannot be foundIncrease usageApparatus for hiring articlesLocation information based serviceGeolocationComputer terminal
The invention discloses a charging service intelligent implementation method and device on the basis of a terminal. The method comprises the steps that a user identity on the terminal is verified, and a corresponding service process is started according to the user identity, wherein the service process comprises the substep that a charging service point is selected and recommended in a database according to geographical position information of the server; charging service reservation is conducted according to the charging service point selected by the user, and if reservation is conducted successfully, a service relationship of the terminal and the charging service point is established; authorization is opened through the service relationship, and the terminal is charged at the charging service point. The charging service intelligent implementation mode achieving the position location, user priority and two way communication functions is provided. The device comprises a user information verification unit, a charging service point selection unit, a service relationship unit and the charging service point. The device provides location and query services through mobile electrical equipment and the charging service point, and effective management is achieved.
Owner:深圳市恒义聚贸易有限公司

Digital identity authentication method and system based on secure two-dimensional code

ActiveCN108712382APrevent leakageSecure loginTransmissionDigital identityThird party
The invention provides a digital identity authentication method based on a secure two-dimensional code, comprising that: the third party application initiates an authorization login request; the identity authentication SDK obtains a session key from the server; the identity authentication SDK encrypts the information of the third party application through the session key, and sends the encrypted information and the authorized login request to the server; the server decrypts through the session key to obtain the information of the third-party application, generates a two-dimensional code and atwo-dimensional code url, and encrypts the two-dimensional code url by using a key, and the identity authentication SDK obtains the encrypted two-dimensional code url; the identity authentication SDKdecrypts the encrypted two-dimensional code url, then the third-party application jumps according to the two-dimensional code url to display the two-dimensional code; and the user scans the two-dimensional code for authentication to authorize the third-party application to log in. The invention also provides a digital identity authentication system based on the secure two-dimensional code to ensure the security of the authorization process and the secure login of the third-party application.
Owner:新大陆(福建)公共服务有限公司

Third-party application authorization and authentication method based on multi-domain collaborative architecture

ActiveCN107018128ASafe and reliable authorized accessTroubleshoot authentication issuesTransmissionThird partySoftware engineering
The invention belongs to the technical field of computer applications, and discloses a third-party application authorization and authentication method based on multi-domain collaborative architecture. Multi-domain collaborative layered architecture is adopted, and consists of a plurality of layers of domains; each domain consists of an Internet of things platform, sensor equipment and a third-party application; permission management and partition are performed on each domain in a layered way; each target domain administrator audits authorization information; after pass of auditing, a plurality of domains through which auditing information passes can be taken as a resource group; and a developer finishes developing work according to an authorization result. Through adoption of the third-party application authorization and authentication method for use among a plurality of domains of the layered architecture, safe and reliable authorization access between a platform and a third-party application is ensured, and a rapid and convenient channel is provided for data interaction between the platform and the third-party application. Compared with a conventional third-party application permission authentication method, the method has the advantage that the authentication problem between a platform permission administrator, a third-party application developer and a platform user in the multi-domain collaborative architecture is solved.
Owner:陕西沃傲信息科技有限公司

System and method for device authorization and remediation

ActiveUS20150281190A1Digital data processing detailsUser identity/authority verificationDiagnostic dataRestoration device
A method is provided for authorizing a device for consuming content. In method includes the steps of generating an authorization request, the authorization request for authorization data including device diagnostic data (instructions) an device remedial data (instructions), transmitting the authorization request from the device to an authorizing service, and authorizing or remediating the device according to an authorization response to the authorization request received from an authorization server.
Owner:ARRIS ENTERPRISES LLC

Key information processing method and device and system thereof

ActiveCN101662361ASecuring communicationCoded identity card or credit card actuationInformation processingComputer module
The invention discloses a key information processing method and a device and a system thereof, which are applied in a smart card system and used for avoiding the problem that the charging mode in the prior art is possible to cause illegal self-charging on user cards by a business process terminal. The method comprises the steps of obtaining a first random number by a business process device; providing the obtained first random number for a background processing system; receiving key information which is fed back by the background processing system and generated by encryption algorithm on the first random number by using first encryption rules; and providing the key information which is used for authentication and authorization of a secure access module for the secure access module.
Owner:BEIJING MUNICIPAL ADMINISTRATION & COMM CARD CO LTD

Method for controlling electronic lock, electronic lock, key terminal and lock cylinder terminal

InactiveCN105989648ANo maintenanceReduce operation and maintenance complexityNon-mechanical controlsIndividual entry/exit registersAuthorizationManagement system
The invention discloses a method for controlling an electronic lock, the electronic lock, a key terminal and a lock cylinder terminal. The method comprises the following steps that when the key terminal is inserted into the lock cylinder terminal, the key terminal supplies power to the lock cylinder terminal; when the key terminal receives a lock mark transmitted by a mobile control terminal, the key terminal reads a lock mark stored by the lock cylinder terminal; and if it is determined that the transmitted lock mark is identical to the read lock mark, the key terminal informs the lock cylinder terminal of unlocking and authorization. According to the invention, an internal power supply in a case is prevented from supplying power to the electronic lock, so considerable regular maintenance of the internal power supply in the case is avoided, and complexity in operation and maintenance of a lock management system is reduced; and thus, operation and maintenance cost for a communication network is decreased.
Owner:ZTE CORP +1

Intelligent lock system and control method thereof

The invention discloses an intelligent lock system and a control method thereof. The intelligent lock system comprises a remote server, a master controller, a plurality of intelligent lock nodes and amobile terminal. A mobile phone APP client side in communication connection with a remote server is arranged in the mobile terminal; the remote server is in communication connection with the master controller; the master controller is in communication connection with the intelligent lock nodes; and each intelligent lock node comprises a photovoltaic cell panel, a rechargeable battery, an externalpower supply, a photovoltaic energy collecting circuit, a lock drive power circuit, an inner core power circuit, a ZigBee communication module, a lock control drive circuit, a lock state input circuit, a central processing unit (CPU) and a lock body. According to the intelligent lock system and the control method thereof provided by the invention, the photovoltaic cell panels and the external power supplies can be adopted for supplying power to the rechargeable batteries, so that the energy is saved, an open-and-close state of the lock body can be detected in real time, and open-and-close information of the lock body can be recorded by the system; and the remote server of the intelligent lock system is logged in through the third-party application authorization, so that the defects of complex operation and inconvenience in application of an existing device or product are overcome.
Owner:NANJING FORESTRY UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products